Mandatory Integrity Control

Results: 28



#Item
11Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [removed] Rahul Kashyap [removed] What is a sandbox? In computer security terminology, a sandbox is an environment designed to run untrusted

Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [removed] Rahul Kashyap [removed] What is a sandbox? In computer security terminology, a sandbox is an environment designed to run untrusted

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2015-04-10 18:42:25
12Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:18
13Computer network security / Public safety / Safety / Electronic commerce / Computer security / Secure communication / Wireless security / Mandatory Integrity Control / Security / Crime prevention / National security

Banner Finance Security Types of Security

Add to Reading List

Source URL: www.csu.edu.au

Language: English - Date: 2011-07-26 21:33:36
14State of the Art of Application Restrictions and Sandboxes

State of the Art of Application Restrictions and Sandboxes

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2013-02-05 23:03:43
15Security Administration Guide

Security Administration Guide

Add to Reading List

Source URL: support.equella.com

Language: English - Date: 2013-05-23 01:27:19
16An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed]  Abstract

An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed] Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
17WHITE PAPER  Security Solutions Escaping from Microsoft’s Protected Mode Internet Explorer

WHITE PAPER Security Solutions Escaping from Microsoft’s Protected Mode Internet Explorer

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2010-12-01 19:00:00
18System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-11-30 16:47:48
19NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California  Data Integrity Limitations in

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL Monterey, California Data Integrity Limitations in

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2009-01-28 17:59:59
20I ’ V E B E E N A C C U S E D , R I G H T LY, O F B E I N G RIK FARROW musings Rik is the Editor of ;login:. [removed]

I ’ V E B E E N A C C U S E D , R I G H T LY, O F B E I N G RIK FARROW musings Rik is the Editor of ;login:. [removed]

Add to Reading List

Source URL: rikfarrow.com

Language: English - Date: 2011-04-20 18:11:22